Enhancing credit card fraud detection: an ensemble machine learning approach AR Khalid, N Owoh, O Uthmani, M Ashawa, J Osamor, J Adejoh Big Data and Cognitive Computing 8 (1), 6, 2024 | 68 | 2024 |
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm M Ashawa, O Douglas, J Osamor, R Jackie Journal of Cloud Computing 11 (1), 87, 2022 | 47 | 2022 |
Analysis of android malware detection techniques: a systematic review MA Ashawa, S Morris Society of Digital Information and Wireless Communications, 2019 | 37 | 2019 |
Analysis of mobile malware: a systematic review of evolution and infection strategies M Ashawa, S Morris جامعة نايف العربية للعلوم الأمنية, 2021 | 25 | 2021 |
Effective methods to detect metamorphic malware: a systematic review M Irshad, HM Al-Khateeb, A Mansour, M Ashawa, M Hamisu International Journal of Electronic Security and Digital Forensics 10 (2 …, 2018 | 25 | 2018 |
Forensic data extraction and analysis of left artifacts on emulated android phones: a case study of instant messaging applications M Ashawa, I Ogwuche Seizure 19, 16, 2017 | 12 | 2017 |
Android Permission Classifier: a deep learning algorithmic framework based on protection and threat levels M Ashawa, S Morris Security and Privacy 4 (5), e164, 2021 | 7 | 2021 |
Vulnerability Assessment and Evaluation of Associated Attacks on Physical and Virtual Networks. M Ashawa IUP Journal of Computer Sciences 12 (2), 2018 | 7 | 2018 |
A perspective overview of the influence of the COVID-19 pandemic on the educational sector KE Ukhurebor, IE Oaihimire, ZB Wada, G Jokthan, J Inegbedion, C Ofulue, ... Journal of Infrastructure, Policy and Development 8 (5), 2955, 2024 | 6 | 2024 |
Modeling correlation between android permissions based on threat and protection level using exploratory factor plane analysis M Ashawa, S Morris Journal of Cybersecurity and Privacy 1 (4), 704-742, 2021 | 6 | 2021 |
Host-based detection and analysis of android malware: Implication for privilege exploitation M Ashawa, S Morris prevalence 8 (9), 10-11, 2019 | 6 | 2019 |
Digital forensics challenges in cyberspace: overcoming legitimacy and privacy issues through modularisation M Ashawa, A Mansour, J Riley, J Osamor, NP Owoh Universal Wiser, 2023 | 5 | 2023 |
Investigating Google Chrome 66.0. 3359 artefact: internet forensics approach N Morris, A Moses International Journal of Computer Science and Mobile Computing 7 (7), 112-122, 2018 | 5 | 2018 |
An adaptive temporal convolutional network autoencoder for malicious data detection in mobile crowd sensing N Owoh, J Riley, M Ashawa, S Hosseinzadeh, A Philip, J Osamor Sensors 24 (7), 2353, 2024 | 4 | 2024 |
Explainable machine learning for LoRaWAN link budget analysis and modeling S Hosseinzadeh, M Ashawa, N Owoh, H Larijani, K Curtis Sensors 24 (3), 860, 2024 | 4 | 2024 |
Original Research Article E-learning systems application programming interfaces security management AY Mai-inji, LO Babatope, KE Ukhurebor, AO Adesina, V Nwaocha, ... Journal of Autonomous Intelligence 7 (5), 2024 | 4 | 2024 |
Enhanced Image-Based Malware Classification Using Transformer-Based Convolutional Neural Networks (CNNs) M Ashawa, N Owoh, S Hosseinzadeh, J Osamor Electronics 13 (20), 4081, 2024 | 2 | 2024 |
Evaluation of Information Security in Web Application Through Penetration Testing Techniques Using OWASP Risk Methodology CC Echefunna, J Osamor, C Iwendi, P Owoh, M Ashawa, A Philip 2024 International Conference on Advances in Computing Research on Science …, 2024 | 2 | 2024 |
Design and development considerations of a cyber physical testbed for operational technology research and education S Hosseinzadeh, D Voutos, D Barrie, N Owoh, M Ashawa, A Shahrabi Sensors 24 (12), 3923, 2024 | 2 | 2024 |
Analysis of mobile malware, evolution and infection strategies: A systematic review M Ashawa, S Morris NAUSS, 2021 | 2 | 2021 |